Vulnerability Description
A vulnerability exits in driver snxppamd.sys in SUNIX Parallel Driver x64 - 10.1.0.0, which allows low-privileged users to read and write arbitary i/o port via specially crafted IOCTL requests . This can be exploited for privilege escalation, code execution under high privileges, and information disclosure. These signed drivers can also be used to bypass the Microsoft driver-signing policy to deploy malicious code.
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- https://github.com/heyheysky/vulnerable-driver/blob/master/CVE-2024-55413/CVE-20
- https://www.sunix.com/tw/
FAQ
What is CVE-2024-55413?
CVE-2024-55413 is a vulnerability with a CVSS score of 7.8 (HIGH). A vulnerability exits in driver snxppamd.sys in SUNIX Parallel Driver x64 - 10.1.0.0, which allows low-privileged users to read and write arbitary i/o port via specially crafted IOCTL requests . This ...
How severe is CVE-2024-55413?
CVE-2024-55413 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-55413?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.